Analysis

  • max time kernel
    84s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 03:05

General

  • Target

    187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b.exe

  • Size

    1016KB

  • MD5

    536bf34ae912efa69399ae0615e7f450

  • SHA1

    3ba338a4be5324c58909fc7277c695c24a72f71b

  • SHA256

    187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

  • SHA512

    95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

  • SSDEEP

    6144:sIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:sIXsgtvm1De5YlOx6lzBH46U

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 21 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b.exe
    "C:\Users\Admin\AppData\Local\Temp\187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe
      "C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe" "c:\users\admin\appdata\local\temp\187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4952
      • C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe
        "C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe" "-C:\Users\Admin\AppData\Local\Temp\wpculyqaskqytonx.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:4460
      • C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe
        "C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe" "-C:\Users\Admin\AppData\Local\Temp\wpculyqaskqytonx.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dxlewkdohahqmiitb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe

          Filesize

          320KB

          MD5

          56ef0882547002a0c21e5ee973c541b9

          SHA1

          e6ef58e113bc13df337ae42cdbc64544864fc00f

          SHA256

          7ed0a65e910f2b3341c501291ba4ab377a184fb2d037254b564525267cf4542f

          SHA512

          507e7ff7f56917ccb7cedc9b38df75f5c24c5624b224c8832f28c571bb8aefbed2c57487127cf31ba7861a42e3e6d9f1b7c9e49c000bb64f6f34054739ddc892

        • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe

          Filesize

          320KB

          MD5

          56ef0882547002a0c21e5ee973c541b9

          SHA1

          e6ef58e113bc13df337ae42cdbc64544864fc00f

          SHA256

          7ed0a65e910f2b3341c501291ba4ab377a184fb2d037254b564525267cf4542f

          SHA512

          507e7ff7f56917ccb7cedc9b38df75f5c24c5624b224c8832f28c571bb8aefbed2c57487127cf31ba7861a42e3e6d9f1b7c9e49c000bb64f6f34054739ddc892

        • C:\Users\Admin\AppData\Local\Temp\khyupgcqmisedcftewgd.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\mhwqjyseysakhefraq.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\qpigdwukigsghindqkwvom.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\wpculyqaskqytonx.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe

          Filesize

          704KB

          MD5

          357717aa49ff5c958fadebc66beef662

          SHA1

          cea3c1eb4dbb3a553aa5efd3705e70de1554ea31

          SHA256

          610ad5ff81d2f7fc320bb3699eab1b54420ee6d00772486b5294f06c5f8fbac3

          SHA512

          141881f1437ea3ea4c162f0f95a939a10d8b1e5b751ffb4ea4309e8931107640551679978ab3922a3b3317b3bb0fdb7f66873697bdbb06985b38edfd393b52ef

        • C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe

          Filesize

          704KB

          MD5

          357717aa49ff5c958fadebc66beef662

          SHA1

          cea3c1eb4dbb3a553aa5efd3705e70de1554ea31

          SHA256

          610ad5ff81d2f7fc320bb3699eab1b54420ee6d00772486b5294f06c5f8fbac3

          SHA512

          141881f1437ea3ea4c162f0f95a939a10d8b1e5b751ffb4ea4309e8931107640551679978ab3922a3b3317b3bb0fdb7f66873697bdbb06985b38edfd393b52ef

        • C:\Users\Admin\AppData\Local\Temp\xhlucgp.exe

          Filesize

          704KB

          MD5

          357717aa49ff5c958fadebc66beef662

          SHA1

          cea3c1eb4dbb3a553aa5efd3705e70de1554ea31

          SHA256

          610ad5ff81d2f7fc320bb3699eab1b54420ee6d00772486b5294f06c5f8fbac3

          SHA512

          141881f1437ea3ea4c162f0f95a939a10d8b1e5b751ffb4ea4309e8931107640551679978ab3922a3b3317b3bb0fdb7f66873697bdbb06985b38edfd393b52ef

        • C:\Users\Admin\AppData\Local\Temp\xtjeyojwrmvgecerbsb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Users\Admin\AppData\Local\Temp\zxpmiaxmjgreeeixjcnld.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\dxlewkdohahqmiitb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\khyupgcqmisedcftewgd.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\mhwqjyseysakhefraq.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\qpigdwukigsghindqkwvom.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\wpculyqaskqytonx.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\xtjeyojwrmvgecerbsb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\SysWOW64\zxpmiaxmjgreeeixjcnld.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\dxlewkdohahqmiitb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\dxlewkdohahqmiitb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\khyupgcqmisedcftewgd.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\khyupgcqmisedcftewgd.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\mhwqjyseysakhefraq.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\mhwqjyseysakhefraq.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\qpigdwukigsghindqkwvom.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\qpigdwukigsghindqkwvom.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\wpculyqaskqytonx.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\wpculyqaskqytonx.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\xtjeyojwrmvgecerbsb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\xtjeyojwrmvgecerbsb.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\zxpmiaxmjgreeeixjcnld.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b

        • C:\Windows\zxpmiaxmjgreeeixjcnld.exe

          Filesize

          1016KB

          MD5

          536bf34ae912efa69399ae0615e7f450

          SHA1

          3ba338a4be5324c58909fc7277c695c24a72f71b

          SHA256

          187e9921f03a46f2a3bd244a98983aeb564e78370471a0185625a2849949646b

          SHA512

          95b9fc3c338a69a59c95a612992206ab171aa57faf5f15d1bc99b4def276d1d1a6b11e163b6fbd7054b6dc00297098a3b8be3c86b1f63655a9beffdb600c612b